DEV Community

# infosec

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Week 1: Being conscious about your attack surface

Week 1: Being conscious about your attack surface

7
Comments
5 min read
OverTheWire Bandit Level 8 Level 9 walk-through

OverTheWire Bandit Level 8 Level 9 walk-through

4
Comments
2 min read
Week 0: Security blog posts introduction

Week 0: Security blog posts introduction

16
Comments
2 min read
OverTheWire Bandit Level 7 Level 8 walk-through

OverTheWire Bandit Level 7 Level 8 walk-through

11
Comments
1 min read
Building Secure REST API Services with Python

Building Secure REST API Services with Python

18
Comments 2
4 min read
OverTheWire Bandit Level 6 Level 7 walk-through

OverTheWire Bandit Level 6 Level 7 walk-through

9
Comments
2 min read
Two-minute InfoSec — Shell History Timestamps

Two-minute InfoSec — Shell History Timestamps

10
Comments
2 min read
OverTheWire Bandit Level 5 Level 6 walk-through

OverTheWire Bandit Level 5 Level 6 walk-through

9
Comments
2 min read
OverTheWire Bandit Level 4 Level 5 walk-through

OverTheWire Bandit Level 4 Level 5 walk-through

4
Comments
1 min read
OverTheWire Bandit Level 3 Level 4 walk-through

OverTheWire Bandit Level 3 Level 4 walk-through

5
Comments
1 min read
How to Check a Sketchy Link Without Clicking It

How to Check a Sketchy Link Without Clicking It

14
Comments
4 min read
What Is Tor and Should We Use It?

What Is Tor and Should We Use It?

17
Comments 9
4 min read
Stuffing of Credentials?

Stuffing of Credentials?

17
Comments 6
3 min read
Jobs in Information Security (InfoSec)

Jobs in Information Security (InfoSec)

83
Comments 9
6 min read
Covert Channels and Data Exfiltration

Covert Channels and Data Exfiltration

5
Comments
9 min read
Google and Samsung Fix Android Flaw that Allowed to Hijack your Camera and Audio to Spy on You

Google and Samsung Fix Android Flaw that Allowed to Hijack your Camera and Audio to Spy on You

6
Comments
3 min read
The Importance of Inventory

The Importance of Inventory

5
Comments
6 min read
Bypassing GitHub's OAuth flow

Bypassing GitHub's OAuth flow

13
Comments
2 min read
Hackers are using a bug in PHP7 to remotely hijack web servers

Hackers are using a bug in PHP7 to remotely hijack web servers

13
Comments
2 min read
XSS and SQLi Polyglot Payloads

XSS and SQLi Polyglot Payloads

10
Comments
3 min read
Sudo Flaw Lets Linux Users Run Commands As Root Even When They're Restricted

Sudo Flaw Lets Linux Users Run Commands As Root Even When They're Restricted

8
Comments 1
1 min read
Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks

Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks

6
Comments
2 min read
This huge Android trojan malware campaign was discovered after the gang behind it made basic security mistakes

This huge Android trojan malware campaign was discovered after the gang behind it made basic security mistakes

7
Comments 5
2 min read
Engaging in OverTheWire's Wargames

Engaging in OverTheWire's Wargames

12
Comments 1
3 min read
Attackers exploit 0day vulnerability that gives full control of Android phones

Attackers exploit 0day vulnerability that gives full control of Android phones

6
Comments 2
2 min read
Testing the Event Horizon - My InfoSec and QA Journey.

Testing the Event Horizon - My InfoSec and QA Journey.

6
Comments
3 min read
Hacker Summer Camp 2019

Hacker Summer Camp 2019

15
Comments
8 min read
OverTheWire Bandit Level 2 Level 3 walk-through

OverTheWire Bandit Level 2 Level 3 walk-through

5
Comments
1 min read
Security Champion

Security Champion

7
Comments
2 min read
OverTheWire Bandit Level 1 Level 2 walk-through

OverTheWire Bandit Level 1 Level 2 walk-through

5
Comments
2 min read
OverTheWire Bandit Level 0 walk-through

OverTheWire Bandit Level 0 walk-through

6
Comments
1 min read
OverTheWire Bandit Level 0 Level 1 walk-through

OverTheWire Bandit Level 0 Level 1 walk-through

5
Comments
1 min read
Shall We Begin? >:-)

Shall We Begin? >:-)

9
Comments
2 min read
Hackitect series vol.2 - Open source cybersecurity zoo

Hackitect series vol.2 - Open source cybersecurity zoo

12
Comments
5 min read
Developers need to stop fearing the InfoSec Mafia

Developers need to stop fearing the InfoSec Mafia

10
Comments
1 min read
Safe Spaces & WoSEC

Safe Spaces & WoSEC

18
Comments 3
2 min read
Access Control List - ACL

Access Control List - ACL

7
Comments
2 min read
SELinux and AppArmor

SELinux and AppArmor

5
Comments
3 min read
Security Headers for ASP.Net and .Net CORE

Security Headers for ASP.Net and .Net CORE

18
Comments
3 min read
Phishing my company. An infosec lesson for businesses

Phishing my company. An infosec lesson for businesses

7
Comments 1
5 min read
the infosec mindset

the infosec mindset

11
Comments
3 min read
Practical Privacy: A Guide for Everyone

Practical Privacy: A Guide for Everyone

8
Comments
1 min read
Effective Communication Security / Beyond 'Use Signal Use Tor'

Effective Communication Security / Beyond 'Use Signal Use Tor'

15
Comments 6
3 min read
A tour through the OWASP Top 10

A tour through the OWASP Top 10

7
Comments
1 min read
Raising security awareness with a CTF competition... did you already participate in one, how it was?

Raising security awareness with a CTF competition... did you already participate in one, how it was?

7
Comments
1 min read
How to create own threat intelligence platform with PHP, cURL and API

How to create own threat intelligence platform with PHP, cURL and API

19
Comments
3 min read
I'm 18 and I do systems security, Ask Me Anything!

I'm 18 and I do systems security, Ask Me Anything!

26
Comments 30
1 min read
The Case for Automatic Updates

The Case for Automatic Updates

11
Comments 1
5 min read
Security Sprint: week 1 - My project and first studies

Security Sprint: week 1 - My project and first studies

12
Comments 2
1 min read
Password Managers Are Too Difficult

Password Managers Are Too Difficult

23
Comments 5
2 min read
Running a Kali VM on a retina display with zero lag

Running a Kali VM on a retina display with zero lag

4
Comments
2 min read
The 'forgotten' ZEE5 data leak you didn't hear about.

The 'forgotten' ZEE5 data leak you didn't hear about.

2
Comments
4 min read
Gradual Security Claims

Gradual Security Claims

7
Comments
3 min read
Securing your ElasticSearch instances

Securing your ElasticSearch instances

11
Comments
4 min read
BSides Cymru Writeup - My Thoughts

BSides Cymru Writeup - My Thoughts

6
Comments
4 min read
Presentations I would love to watch

Presentations I would love to watch

6
Comments
2 min read
The Dangers of Shadow IT

The Dangers of Shadow IT

4
Comments
3 min read
How DevOps Increases System Security

How DevOps Increases System Security

5
Comments
6 min read
Question about topic

Question about topic

7
Comments 7
1 min read
Security Testing: Fighting against bots

Security Testing: Fighting against bots

8
Comments
3 min read
loading...